www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242

advertisement
www.ijecs.in
International Journal Of Engineering And Computer Science ISSN:2319-7242
Volume 2. Issue 11 Nov.2013 Page No. 3346-3351
Performance Analysis of ANODR and ZRP protocol
against Wormhole attack in Wireless Sensor Network
Er. Gurjot Singh
Baba Banda Singh Bahadur Engineering College,
Fatehgarh Sahib, Punjab, India
Abstract: Wireless sensor network consist of spatial distributed sensor nodes deployed in a hostile and dense environment to gather
information and propagate it to the base station for further processing. In the insecure wireless transmission medium, the enemies can
analysis the data traffic against intercept-able routing information embedded in routing data packets. Allowing adversaries to trace network
routing information and other critical information at the end of those routes may pose a serious threat to covert operations. Wireless sensor
network has limited resources like bounded storage space, energy and computation power. In this paper, to prevent the network from
wormhole attack, the ANODR, an anonymous on-demand routing protocol is implemented. The wormhole attack is one of the severe attack
on WSN that can effect the networks performance. In this, attackers create a low-latency link between two points in the network. The
wormhole attack tunnels the packets from one end to another end by modifying or altering its content. For route anonymity problem, the
ANODR prevents strong adversaries from tracing a packet flow back to its originator and for location privacy problem, ANODR ensures
that adversaries cannot discover the real identities of authenticated transmitters. The architecture of ANODR is based on technique named
"broadcast with trapdoor information". The qualnet 4.5.1 simulator is opted to analyze the performance of ANODR on the basis of metrics
like frame tunneled, frame dropped and intercepted.
Keywords- Wormhole attack, WSN, ANODR, ZRP
1. Introduction to WSNs
When Wireless sensor network are composed of a large set of
homogeneous nodes with extreme resource constraints. Each
sensor node has wireless communication capability plus some
level of intelligence for signal processing and data networking.
These nodes are usually scattered over the area to be monitored
to collect data, process it, and forward it to a central node for
further processing. Military sensor networks might detect and
gather information about enemy movements of people and
equipment, or other phenomena of interest such as the presence
of chemical, biological, nuclear, radiological, explosive
materials. WSNs can support a myriad of uses including
military, commercial, environmental, and medical applications.
Natural environments such as remote ecosystems, disaster sites,
endangered species, agriculture conditions, and forest fires can
also be monitored with sensor networks[1].
Sensor networks are small, low-cost, low-power devices
with the following functionality: they communicate over short
distances, sense environmental data, and perform limited data
processing. A typical node might have only 4MHz of
processing power, 4KB of RAM, and a short transmission
distance of less than 100 feet. Tiny OS is a small, open-source
operating system developed to support most WSN applications.
Wireless sensor networks often contain one or more sinks that
provide centralized control. A sink typically serves as the
access point for the user or as a gateway to another network.
The sensor nodes communicate using RF, so broadcast is the
fundamental communication primitive[2]. Security is one of the
most difficult problems facing these networks. For certain
applications of sensor networks, like military applications,
security
becomes
very
important.
First,
wireless
communication is difficult to protect since it is realized over a
broadcast
medium.
In
a
broadcast
medium,
adversaries/attackers can easily intercept, inject, and alter
transmitted data or information. Second, sensor networks are
deployed in a variety of insecure environments so the
adversaries can easily steal nodes, recover their cryptographic
material and behave as authorized nodes in the network. Third,
the sensor networks are vulnerable to resource consumption
attacks. Attackers can repeatedly send data packets to drain a
node battery and waste network bandwidth. In these security
sensitive deployments, secure transmission of sensitive
information over the sensor network is essential. The use of
encryption and authentication algorithms are primitives
between two sensor devices and it requires an initial link key
establishment process, which must satisfy the low power and
low complexity requirements[3, 4].
1.1. Threats to wireless sensor network
In order to appreciate the challenge of securing a WSN
against attack, it is necessary to consider the possible threats to
its security. There are a large and increasing number of threats
and attacks to which WSNs are susceptible. They can be
broadly classified as attacks against the privacy of the network
data, denial of service (DOS) attacks, impersonation or
replication attacks and physical attacks.[5] In addition to the
types of attack, it is also worth considering that attacks can be
launched at any point in the network. The wormhole attack can
be described as follow:
1.1.1. Wormhole Attack
Er.Gurjot Singh, IJECS Volume 2 Issue 11November,. 2013, Page No.3346-3351
Page 3346
Wormhole attack is one of the severe Denial-of-Service attack
on the network layer, that can affect the data routing, data
aggregation and localization dependent wireless security. [6]
The wormhole attack may be launched by a single or a pair of
nodes. In two ended wormhole, one end overhears the data
packets and forwards them through the tunnel to the other end/
destination, where the packets are replayed to local area or
network. For tunneled distances longer than the normal
wireless transmission range of a single hop, it is easy for the
attacker/ adversaries to make the tunneled packet arrive with
better metric than a normal multihop route. In case when they
only forward all the data packets without altering the content in
them, they boost up the transmission in the network than the
normal one. In majority of the cases, it either drops or
selectively forwards the data packets leads to the network
disruption. The wormhole attack does not require MAC
protocol information and also it is immune to cryptographic
techniques. [7] This makes it very difficult to detect. A number
of approaches have been proposed for handling wormhole
attack. Some techniques simply detect the presence of
wormhole in the network, while other approaches also focus on
avoiding or preventing the wormhole attack. Mostly techniques
require additional hardware support, time synchronization and
localization information or may be confined to specific routing
algorithm. Wormhole attack are simple to deploy but it may
cause significant damage to network [8].

Wormhole using out-of-band channel
In this, two-end wormhole, a dedicated out-of-band high
bandwidth channel is placed in between end points to create a
wormhole link [10].

Wormhole using packet encapsulation
Each packet is routed through the legtimate path only, when
received by wormhole end, gets encapsulated to prevent nodes
on the way from incrementing hop counts. The packet is
brought into original form bt the second end point.
 Wormhole using high power transmission
This kind of wormhole approach has only one malicious node
with much high transmission capability that attracts the packets
to follow path passing through it.
 Wormhole using Packet Relay
In this, only one malicious node is needed that replays packets
between two far nodes and this way fake neighbors of the
original nodes are created.
 Wormhole using Protocol Deviation
The adversary node formed the wormhole by forwarding data
packets without backing off unlike a legitimate node can done
thus, increases the possibility of wormhole path getting selected
[10].
2. Secure Routing Protocol
Wireless networks are different from other contemporary
communication and wireless ad hoc networks routing is a very
challenging task in WSNs. For the deployed constrained sensor
nodes it is impractical to build a global scheme for them.
Mostly the applications of sensor networks have the
requirement of transmitting the sensed data from multiple
points to a common destination called sink. Resource
management is required in sensor nodes regarding transmission
power, storage, on-board energy and processing capacity. For
Security aspect in mind, a secure routing protocol (ANODR) is
used for routing in WSN. For Security purposes, a secure
routing protocol (ANODR) is used for routing in WSN [9].
1. ANODR (Anonymous on-demand Routing (ANODR)
Protocol): It is designed to provide a net-centric anonymous
and untraceable routing scheme for wireless ad-hoc network.
Anonymous On-demand Routing Protocol is designed to
provide an anonymous and untraceable routing scheme for
wireless ad-hoc networks. It is based on table-driven AODV
routing protocol. As in other routing protocols network routes
are open to all i.e. packets sent in wireless manner then any
adversaries can trace the network route and infer the pattern of
the packets that are being communicate between
communicating parties. This may pose a severe threat to
network and challenging constraint for routing and data
forwarding. The ANODR protocol allows you to protect the
wireless communication from being traced and without
removing your device`s battery. The adversaries should not
trace the data packets that are sent by ANODR secure routing
protocol. It provides untraceable path for data communication
[11]. ANODR provides the following security services:
1. Negligibility- based on anti-tracing such that signal
interceptors cannot trace signal transmitters mobility pattern
via wireless signal tracing (with non-negligible probability
defined on the victim network‟s size).
2. Confidentiality and anonymity- The path follows by the
packets should not be traced by any adversaries.
3. Traffic flow confidentiality- Conceals the message content
through encryption.
4. Identity-free routing- The identity cannot be stole by other.
5. One-time packet contents such that any two wireless
transmissions are indistinguishable with each other in regard to
a cryptanalyst.
The ANODR configuration is based on AODV parameter
settings. ANODR parameters use the same terminology as
AODV's parameters, except the name is changed from AODV
to ANODR. These services are provided at the Network Layer
and Link Layer to protect the IP and link layer protocols [9].
3. Related Work
Dr.G.Padmavathi, Dr.P.Subashini and Ms.D.Devi Aruna [16]
had proposed protocol ANODR- ECC with Telnet provide
application layer security and it ensures route anonymity and
location privacy
and is robust against eavesdropping
attack.For route anonymity, it prevents strong adversaries from
tracing a packet flow back to its source or destination; for
location privacy, it ensures that adversaries cannot discover
the real identities of local transmitters. The simulation is done
using network simulator qualnet 5.0 for different number of
mobile nodes. The proposed model has exposed improved
results in terms of Average throughput, Average end to end
delay, Average packet delivery ratio and Average
jitter.
Hyeon Myeong Choi, Su Man Nam, Tae Ho Cho [17] had
proposed a secure routing method for detecting false report
injections and wormhole attacks in wireless sensor networks.
The proposed method uses ACK messages for detecting
wormholes and is based on a statistical en-route filtering (SEF)
scheme for detecting false reports. Simulation results show
Er.Gurjot Singh, IJECS Volume 2 Issue 11November,. 2013, Page No.3346-3351
Page 3347
that the proposed method reduces energy consumption by up to
20% and provide greater network security.
Annie Jesus, Suganthi Rani.A and R.Mathan [18] had
presented a protocol named USOR. It is an Unobservable
Secure On-demand Routing protocol for mobile ad hoc
network that achieves unlinkability and unobservability by
employing anonymous key establishment based on group
signature. There is no security provision against the wormhole
and black hole attacks in existing USOR protocol. AODV,
USOR and modified USOR are implemented on ns2, and there
performance is evaluated.
Varsha Sahni, Vivek Thapar and Bindiya Jain [19] had
evaluated the affects of wormhole attack on performance of
AODV and DSR routing protocols on varying node mobility.
WSN‟s protocol has different security flaws and using these
flaws many kind of attack possible on wireless sensor -network.
Wormhole is one of these attacks. Wormhole attack causes
serious affect on performance of the WSN protocol and
preventing the attack has proven to be very difficult. This paper
illustrates how wormhole attack affects performance of routing
protocol in wireless sensor network using random waypoint
mobility model with varying node mobility. They also analyze
the effectiveness of WEP and CCMP security protocol against
wormhole using DSR and AODV protocol.
Syed Basha Shaik and S. P. Setty [20] had analyzed the
performance of AODV, DSR and ANODR in Grid placement
model is evaluated for different network sizes, using
QualNet5.0.2 simulator. The significance of network size for
the performance of AODV, DSR and ANODR protocols is
studied. From results they can conclude that at less network
sizes all the protocols in Grid placement give encouraging
results. DSR is giving higher throughput and packet delivery
ratio for all network sizes when ANODR giving less average
jitter and end-to-end delay.
Terrain Size
Simulation Time
Radio/Physical Layer
No. of Nodes
Secure Routing Protocol
Attack
Traffic Type
Routing Protocol
Energy Model
Mobility Model
Device type
1500*1500
200sec
802.15.4
50
ANODR
Wormhole
attack
(Threshold
CBR
ZRP
Micaz
Random Waypoint
PAN coordinator, ffd
and rfd
1. Simulation Scenario
The nodes are placed randomly on terrain of size 1500*
1500m. There are total 20 nodes placed on terrain. One
wireless cloud is placed on the terrain has configured to
802.15.4. All the nodes are link wirelessly with the wireless
subnet cloud except the two nodes named 7 and 13 as shown in
figure 1. The nodes 7 and 13 are link to other wireless subnet
cloud have configure to wormhole attack. The nodes are made
mobile nodes that move randomly on the terrain. CBR is used
as data traffic application with multiple source and destination.
Then secure protocol ANODR is configured on all the nodes
and simulation is run for 200 seconds i.e. the simulation time.
The working of simulation is shown in figure 2.
4. Simulation Setup
To evaluate the performance of ANODR in wireless sensor
network the QualNet 4.5.1 Network Simulator tool is used. In
the simulation scenario, the nodes are deployed randomly in a
terrain of size of 1500*1500m. CBR is used as data traffic
application with multiple source and destination. To configure
the application and for mobility of nodes profile configuration,
application configuration objects are included in scenario. It
consists of basic network entities as sensor nodes (mobile) and
PAN coordinator. The PAN coordinator used is fully
functioned and other remaining nodes are reduced function
devices having limited constraints like storage, energy and
power. The wormhole attack is implemented on random
number of node in network. The security schemes ANODR is
implemented on sensor network against wormhole attack. The
performance is measured on the basis of metrics like frame
dropped, frame tunneled and intercepted. The simulation time
is 200 second. For simulation the different parameters are set
are shown in table 1:
Figure 1. Simulation Scenario setup
Table 1. Simulation parameters setup for QualNet simulator
Er.Gurjot Singh, IJECS Volume 2 Issue 11November,. 2013, Page No.3346-3351
Page 3348
1. Frame Dropped-
Figure 2. Working of Simulation Scenario
2. Performance metrics
The following performance metrics are considered in analyzing
the performance evaluations of routing protocols.
1. Frames intercepted all- Number of frames intercepted by
the wormhole node.
Figure 3. Frame dropped by wormhole
2. Frame Intercept-
2. Frames dropped by wormhole- Number of frames
dropped by the wormhole link (since the frames are classified
as data packets, for example, with packet size greater than a
threshold).
3. Frames tunneled- Number of frames tunneled by the
wormhole node. (Frames intercepted multiple times due to
repetitive replay will not be tunneled.)
5. Result and Discussion
This section evaluates the performance of ANODR protocol
against wormhole attack in wireless sensor network. After
describing our implementation and simulation setup, it has been
evaluate how ANODR defends the wormhole attack in WSNs.
The performance is evaluates on the basis of metrics like frame
tunneled, frame dropped and intercepted.
A. ZRP Routing Protocol- Zone Routing Protocol (ZRP) [12]
combines the benefits of pro-active discovery inside node's
limited neighborhood (Intra Zone Routing Protocol (IARP))
[13], and also uses a reactive protocol for interaction among
neighborhoods. The Broadcast Resolution Protocol (BRP) is
used to forward route request. ZRP partitions the complete
network in many zones. This protocol is classified as a flat
protocol due to overlapping of zones. As a result network
congestion can be reduced and optimal routes can be detected.
[14, 15].
Figure 4. Frame intercept all
3. Frame tunneled by wormhole attack
Er.Gurjot Singh, IJECS Volume 2 Issue 11November,. 2013, Page No.3346-3351
Page 3349
Figure 7. Frame intercept all in ANODR protocol
Figure 5. Frame tunneled by wormhole
The above figures 3, 4 and 5 shows the performance
of ZRP routing protocol under wormhole attack. The values of
frame dropped, frame tunneled and intercept by wormhole
attack under ZRP protocol is 1933 at node number 7 and 1265
at node number 13.
3. Frame Tunneled-
B. ANODR protocol- It is designed to provide a net-centric
anonymous and untraceable routing scheme for wireless ad-hoc
network. It is based on table-driven AODV routing protocol.
1. Frame Dropped-
Figure 8. Frame tunneled by wormhole in ANODR protocol
Figure 6. Frame dropped by wormhole in ANDOR protocol
2. Frame Intercept-
The above figures 6, 7 and 8 shows the performance of
ANODR secure routing protocol under wormhole attack. The
values of frame dropped, frame tunneled and intercept by
wormhole attack under ZRP protocol is 56 at node number 7
and 34 at node number 13. The table 1 shows the total number
of frame that are effected by wormhole attack.
Table 2- Total frame drop, tunnel and intercept by wormhole attack in ZRP
and ANODR protocols
Er.Gurjot Singh, IJECS Volume 2 Issue 11November,. 2013, Page No.3346-3351
Page 3350
Total
ZRP routing
Frame intercept
tunneled
protocol
dropped ANODR
Total secure
Frame routing
intercept
tunneled
droppedprotocol
by
by
by wormhole- 3198
wormhole- 90
6. Conclusion
In this paper, the performance of ANODR secure routing
protocol is analyzed with comparison to other routing protocol
i.e. ZRP. The implementation and simulation of wormhole
attack on routing protocols in wireless sensor network is done
and evaluated the effect on the data packets being sent in
network using qualnet simulator. Parameter like frame
dropped, tunnel and intercepted are analyzed. The results show
that the presence of wormhole attack affects the data packets
being sent by the routing protocol in the wireless sensor
network. Finally, it‟s observed that, ZRP routing protocol is
less effective as compared to ANODR secure routing protocol
as all the parameters are positive in ANODR routing protocol
than in ZRP routing protocol. Frame intercepted by wormhole
attack is more in ZRP routing protocol as compare to ANODR
secure protocol as shown in figure. So ANODR routing
protocol is better against wormhole attack in wireless sensor
network than ZRP routing protocol. The ZRP routing protocol
is hybrid protocol, the combination of reactive and proactive
routing protocols and the ANODR configuration is based on
AODV routing protocol. It is designed to provide a net-centric
anonymous and untraceable routing scheme for wireless sensor
network. The ANODR protocol allows you to protect the
wireless communication from being traced and without
removing your device's battery.
References
[1] I. F. Akyildiz, W. Su, Y. Sankarasubramaniam, and E. Cayirci,
“Wireless sensor networks: A survey”, Computer Networks Journal,
Elsevier Science, Vol. 38, No. 4, pp 393– 422, March 2002.
[2] J. M. Kahn, R. H. Katz, and K.S. Pistcr, Mobile Networking for
Smart Dust, ACM/IEEE International Conference on Mobile
Computing (MobiCom „99), Seattle, WA, 1999, 217 – 278.
[3] J. Staddon, D. Balfanz, and G. Durfee. “Efficient tracing of failed
nodes in sensor networks”, Proc. of the first ACM International
workshop on Wireless sensor networks and applications (WSNA),
ACM Press, 2002, 122-130.
[4] Ritu Sharma, Yogesh Chaba, Yudhvir Singh, “Analysis of
Security Protocols in Wireless Sensor Network”, Int. J. Advanced
Networking and Applications Volume: 02, Issue: 03, Pages: 707-713
(2010)
[5] David Boyle, Thomas Newe,” Securing Wireless Sensor
Networks: Security
Architectures”, JOURNAL OF NETWORKS, VOL. 3, NO. 1,
JANUARY 2008, pp. 65- 77.
[6] Devesh Jinwala, “Ubiquitous Computing:Wireless Sensor
Network Deployment, Models, Security, Threats and Challenges”,in
National conference NCIIRP-2006,SRMIST, pp.1-8,April 2006.
[7] Rouba El Kaissi, Ayman Kayssi, Ali Chehab and Zaher
Dawy,“DAWWSEN:A Defense Mechanism against Wormhole
Attacks In Wireless Sensor Networks”, in The Second International
Conference
on Innovations In Information Technology, pp. 1-10,
2005.
[8] Er. Gurjot Singh, Er. Gurpreet Kaur, “Analyzing the Impact of
Wormhole Attack on Routing Protocol in Wireless Sensor Network
on Behalf of packet tunnel, dropped and intercepted”, International
Journal of Engineering Development and Research, Vol.1 No.1, PP.
42- 48, 2013.
[9] Gurjot Singh and Sandeep Kaur Dhanda, “Performance Analysis
of Security Schemes in Wireless Sensor Network”, International
Journal of Advanced Research in Computer and Communication
Engineering, Vol. 2, Issue. 8, pp. 3217- 3223, 2013.
[10] Gurpreet Kaur and Sandeep Kaur Dhanda, “Analyzing the effect
of wormhole attack on routing protocols in Wireless Sensor
Network”, International Journal of Advanced Research in Computer
and Communication Engineering, Vol. 2, Issue. 8, pp. 3217- 3223,
2013.
[11] Jiejun Kong, Xiaoyan Hong, “ANODR: Anonymous On Demand
Routing with Untraceable Routes for Mobile Adhoc Networks”,
ACM, 2004.
[12]Haas, Z.J., Pearlman, M.R. and Samar, P., "Intrazone Routing
Protocol (IARP)," IETF Internet Draft, draft-ietfmanet-iarp- 02.txt,
July 2002.
[13] Zygmunt J. Haas Marc R.Pearlman and Prince Samar, “The Zone
Routing Protocol for Adhoc Networks”, draft-ietf- manet-zone-zrp04.txt, July 2002.
14] Haas, Zygmunt J., Pearlman, Marc R.: The Performance of Query
Control Schemes for the Zone Routing Protocol, August 2001,
IEEE/ACM Transactions on Networking, Vol.9, No. 4.
[15] I. Sumaiya Thaseen, K. Santhi, “ Performance Analysis of FSR,
LAR and ZRP Routing Protocols in MANET”, International Journal
of Computer Applications (0975 – 8887) Volume 41– No.4, March
2012.
[16] Dr.G.Padmavathi, Dr.P.Subashini and Ms.D.Devi Aruna,
“ANODR-ECC Key Management protocol with TELNET to
secure Application and Network layer for Mobile Adhoc
Networks”, International Journal of Distributed and Parallel
Systems (IJDPS) Vol.3, No.1, January 2012.
[17] Hyeon Myeong Choi, Su Man Nam, Tae Ho Cho, “A
Secure Routing Method for Detecting False Reports and
Wormhole Attacks in Wireless Sensor Networks”, Wireless
Sensor Network, 2013, 5, 33-40.
[18] Annie Jesus, Suganthi Rani.A and R.Mathan, “ An
Unobservable Secure Routing Protocol against Wormhole and
Black hole Attacks in MANET”, International Journal of
Advanced Research in Computer Engineering & Technology
(IJARCET) Volume 2, Issue 3, March 2013.
[19] Varsha Sahni, Vivek Thapar and Bindiya Jain, “Security
Implications of Ad-hoc Routing Protocols against Wormhole
Attack using Random Waypoint Mobility Model in Wireless
Sensor Network”, International Journal of Computer Science
and Information Security, Vol. 9, No. 11, November 2011.
[20] Syed Basha Shaik and S. P. Setty, “Performance
Comparison of AODV, DSR and ANODR for Grid Placement
Model”, International Journal of Computer Applications (0975
– 8887) Volume 11– No.12, December 2010.
Er.Gurjot Singh, IJECS Volume 2 Issue 11November,. 2013, Page No.3346-3351
Page 3351
Download